The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

These email addresses have since become the target of a phishing campaign, with hackers targeting users with a malicious Word document that, when opened, attempts to trick users into activating Microsoft Word's macro feature. If this feature is allowed to execute, the Word macro functions embedded in the Word document will download and install malware on the victim's computer.

The dodgy emails were designed to look like they were sent by DocuSign and had subject lines that said "Completed: [domain name] - Wire transfer for recipient-name Document Ready for Signature" or "Completed [domain name/email address] - Accounting Invoice [Number] Document Ready for Signature."

DocuSign has said that no other customer details, such as names, addresses, passwords or credit card data, was taken in the attack on its systems.

DocuSign said in a statement: "Today we confirmed that a malicious third party had gained temporary access to a separate, non-core system that allows us to communicate service-related announcements to users via email. A complete forensic analysis has confirmed that only email addresses were accessed.

"We took immediate action to prohibit unauthorized access to this system, we have put further security controls in place, and are working with law enforcement agencies."

The e-signature firm is advising customers to forward any fishy-looking emails they receive to [email protected], so the company's security team can analyse emerging threats. DocuSign adds that emails should be deleted afterwards, and advises customers to check that any anti-virus software is up to date. µ